On the Age of Pseudonyms in Mobile Ad Hoc Networks Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec and Jean-Pierre Hubaux Infocom 2010.

Slides:



Advertisements
Similar presentations
Mobility Entropy and Message Routing in Community-Structured Delay Tolerant Networks Hideya Ochiai Hiroshi Esaki The University of Tokyo / NICT Asia Future.
Advertisements

On the Optimal Placement of Mix Zones Julien Freudiger, Reza Shokri and Jean-Pierre Hubaux PETS, 2009.
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
1 Analysis of Random Mobility Models with PDE's Michele Garetto Emilio Leonardi Politecnico di Torino Italy MobiHoc Firenze.
Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya Ravishankar,
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
URSA: Providing Ubiquitous and Robust Security Support for MANET
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
1 Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Yu-Ta Chen 2006 Advanced Wireless Network.
Quantifying Location Privacy: The Case of Sporadic Location Exposure Reza Shokri George Theodorakopoulos George Danezis Jean-Pierre Hubaux Jean-Yves Le.
Multi-Variate Analysis of Mobility Models for Network Protocol Performance Evaluation Carey Williamson Nayden Markatchev
Mini-Project 2007 On Location Privacy in Vehicular Mix-Networks Julien Freudiger IC-29 Self-Organised Wireless and Sensor Networks Tutors: Maxim Raya Márk.
1 A Distortion-based Metric for Location Privacy Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA - November 9, 2009 Reza Shokri.
ODE and Discrete Simulation or Mean Field Methods for Computer and Communication Systems Jean-Yves Le Boudec EPFL MLQA, Aachen, September
Three heuristics for transmission scheduling in sensor networks with multiple mobile sinks Damla Turgut and Lotzi Bölöni University of Central Florida.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Geographic Gossip: Efficient Aggregations for Sensor Networks Author: Alex Dimakis, Anand Sarwate, Martin Wainwright University: UC Berkeley Venue: IPSN.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Scalable Information-Driven Sensor Querying and Routing for ad hoc Heterogeneous Sensor Networks Maurice Chu, Horst Haussecker and Feng Zhao Xerox Palo.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
1 A Class Of Mean Field Interaction Models for Computer and Communication Systems Jean-Yves Le Boudec EPFL – I&C – LCA Joint work with Michel Benaïm.
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
Allerton 2011 September 28 Mathias Humbert, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux EPFL - Laboratory for Communications and Applications (LCA1)
Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective
Mobile Networks - Module H2 Privacy in Mobile Networks Privacy notions and metrics Location privacy Privacy preserving routing in ad hoc networks Slides.
Privacy Issues in Vehicular Ad Hoc Networks.
Revocation Games in Ephemeral Networks Maxim Raya, Mohammad Hossein Manshaei, Márk Félegyházi, Jean-Pierre Hubaux CCS 2008.
Mean Field Methods for Computer and Communication Systems Jean-Yves Le Boudec EPFL ACCESS Distinguished Lecture Series, Stockholm, May 28,
Quantifying Location Privacy Reza Shokri George Theodorakopoulos Jean-Yves Le Boudec Jean-Pierre Hubaux May 2011.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Performance Evaluation Lecture 2: Epidemics Giovanni Neglia INRIA – EPI Maestro 9 January 2014.
PhD-TW-Colloquium, October 09, 2008Polling systems as performance models for mobile ad hoc networking Ahmad Al Hanbali, Richard Boucherie, Jan-Kees van.
WMNL Sensors Deployment Enhancement by a Mobile Robot in Wireless Sensor Networks Ridha Soua, Leila Saidane, Pascale Minet 2010 IEEE Ninth International.
UbiStore: Ubiquitous and Opportunistic Backup Architecture. Feiselia Tan, Sebastien Ardon, Max Ott Presented by: Zainab Aljazzaf.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
A review of M. Zonoozi, P. Dassanayake, “User Mobility and Characterization of Mobility Patterns”, IEEE J. on Sel. Areas in Comm., vol 15, no. 7, Sept.
Energy Efficient Phone-to-Phone Communication Based on WiFi Hotspots in PSN En Wang 1,2, Yongjian Yang 1, and Jie Wu 2 1 Dept. of Computer Science and.
1 Mobile-Assisted Localization in Wireless Sensor Networks Nissanka B.Priyantha, Hari Balakrishnan, Eric D. Demaine, Seth Teller IEEE INFOCOM 2005 March.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Universität Stuttgart Institute of Parallel and Distributed Systems (IPVS) Universitätsstraße 38 D Stuttgart Contact-Based Mobility Metrics for Delay-
Preserving Location Privacy in Wireless LANs Jiang, Wang and Hu MobiSys 2007 Presenter: Bibudh Lahiri.
Ahmed Osama Research Assistant. Presentation Outline Winc- Nile University- Privacy Preserving Over Network Coding 2  Introduction  Network coding 
How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux PETS.
GameSec 2010 November 22, Berlin Mathias Humbert, Mohammad Hossein Manshaei, Julien Freudiger and Jean-Pierre Hubaux EPFL - Laboratory for Computer communications.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
On Non-Cooperative Location Privacy: A Game-theoreticAnalysis
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Smart Sleeping Policies for Wireless Sensor Networks Venu Veeravalli ECE Department & Coordinated Science Lab University of Illinois at Urbana-Champaign.
O N THE O PTIMAL P LACEMENT OF M IX Z ONES : A G AME -T HEORETIC A PPROACH Mathias Humbert LCA1/EPFL January 19, 2009 Supervisors: Mohammad Hossein Manshaei.
Optimizing the Location Obfuscation in Location-Based Mobile Systems Iris Safaka Professor: Jean-Pierre Hubaux Tutor: Berker Agir Semester Project Security.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks. Authors: Laurent Bindschaedler, Murtuza Jadliwala,
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
National Taiwan University Department of Computer Science and Information Engineering Vinod Namboodiri and Lixin Gao University of Massachusetts Amherst.
SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan.
Mean Field Methods for Computer and Communication Systems Jean-Yves Le Boudec EPFL Network Science Workshop Hong Kong July
Geographic Routing without Location Information. Assumption by Geographic Routing Each node knows its own location.  outdoor positioning device: GPS:
Routing Protocols to Maximize Battery Efficiency
A tale of many cities: universal patterns in human urban mobility
Location Cloaking for Location Safety Protection of Ad Hoc Networks
Towards Measuring Anonymity
Presented By Siddartha Ailuri Graduate Student, EECS 04/07/17
A Unified Framework for Location Privacy
Presentation transcript:

On the Age of Pseudonyms in Mobile Ad Hoc Networks Julien Freudiger, Mohammad Hossein Manshaei, Jean-Yves Le Boudec and Jean-Pierre Hubaux Infocom 2010

Get Location Cellular networks GPS Wifi IP 2 Share location Twitter Flickr Google search Foursquare Loopt Google Latitude Ovi … Location-based Applications

Context-based Applications 3 Sense neighborhood Ad hoc communications RFID Communicate Vehicular Networks Proximity-based Social Networks Opportunistic communications Delay-tolerant networks …

Locality is one contextual information most useful when combined with others 4 Hyper-connected World

5 S POTRANK by Skyhook wireless Provides insight into human behavior Enables localized services Helps city planners Location

“Understand urban construct through the interaction of its parts” 6 Petra Kempf, Architect and Urban Designer You Are the City

Privacy Threat Human movement is highly predictable and follows simple reproducible patterns Visited locations reveal – Personal activities – Professional activities – Social activities 7 C. Song, Z. Qu, N. Blumm and A.-L.Barabasi. Limits of Predictability in Human Mobility. Science 2010

Location is identity 8

“It’s not where you are, it’s where you have been” 9 Gary Gale, Yahoo

G OAL Control location disclosure 10

This Paper Consider – Context-based applications – Ad hoc wireless communications – Mix zones to prevent tracking of users Contribution – Measure achieved location privacy using the distribution of age of pseudonyms 11

Ad Hoc Networks (Peer-to-Peer Wireless Communications) Message Signature + certificate Identifier Pseudonym

Assumptions N mobile nodes WiFi/Bluetooth enabled Ad hoc communications Certification authority (CA)

Threat: Tracking Global passive eavesdropper tracks location of mobile nodes

Solution: Mix Zones 15 Mix zone x x y y ? A. Beresford and F. Stajano. Mix Zones: user privacy in location aware services. Percom, 2004 M. Li et al. Swing and Swap: User-centric approaches towards maximizing location privacy. WPES, 2006 Temporal decorrelation: Change pseudonym Spatial decorrelation: Remain silent

Gain and Cost 16 Gain Tracking uncertainty of adversary (entropy) Depends on number of nodes in mix zone and trajectory Cost γ Obtain new pseudonym Update routing tables Silent period

Mix Zones Mix network Mix networks vs Mix zones 17 Mix node Mix node Mix node Mix node Mix node Mix node Alice Bob Alice source Alice destination

The Problem 18 Can we measure the location privacy achieved with a network of mix zones?

Outline 1.Age of Pseudonym: A Metric for Location Privacy 2.Dynamical System: Mean Field Equations 3.Analytical Results 4.Numerical Results 19

Age of Pseudonym Adversary can track nodes between mix zones Mix zone = confusion point 20 Mix zone 1 Mix zone 2 T RACEABLE Older age of pseudonym results in lower location privacy Age of PseudonymLocation Privacy

Evolution of Age of Pseudonym 21 2 E2E2 1 E1E1 E 2 :Success E 1 : Success E 3 :Failure 3 E3E3 Age: A A

Outline 1.Age of Pseudonym: A Metric for Location Privacy 2.Dynamical System: Mean Field Equations 3.Analytical Results 4.Numerical Results 22

Mean Field Theory Replace interactions between nodes with average interaction 23 M. Benaım and J.-Y. Le Boudec. A class of mean field interaction models for computer and communication systems. Performance Evaluation, 65(11-12):823–838, 2008

Goal Measure probability distribution of a certain state – CDF of the age of pseudonym Mean field theory says “CDF is known to satisfy ordinary differential equations when N goes to infinity” 24

Model Parameters Communication model – : Communication rate Mobility Model – η: Rate of meetings – : Average number of nodes in meetings Cooperation model – c(z): Probability of cooperation at age z 25

26 Mean Field Equations: Drift Process At each time step, the age of pseudonym is incremented with rate 26

Mean Field Equations: Jump Process (1) can successfully change its pseudonym c(z): Probability of cooperation of node with age z q(t): Probability of finding at least one cooperative node  : Rate of meetings 27

28 Mean Field Equations: Jump Process (2) cannot find a cooperative partner

29 Mean Field Equations

Outline 1.Age of Pseudonym: A Metric for Location Privacy 2.Dynamical System: Mean Field Equations 3. Analytical Results 4.Numerical Results 30

Stationary mode (t goes to infinity) Cooperation is a threshold function 31

Mean Field Equation 32

Solution: PDF of the Age of Pseudonyms 33

Outline 1.Age of Pseudonym: A Metric for Location Privacy 2.Dynamical System: Mean Field Equations 3.Analytical Results 4.Numerical Results 34

Gamma Cost of Pseudonym change 35 Constant -- f(0) Exponential Exponential X Polynomial Result 1: High  results in older pseudonym distribution because of second jump process  = 5, =1, c 0 =1

Theta Cooperation Threshold 36 Result 2: High  results in older pseudonym distribution because there is less cooperation.  = 5, =1, c 0 =1

Lambda Communication rate 37 Result 3: High results in older pseudonym distribution because pseudonym ages faster.  = 1,  =5, c 0 =1

Average number of nodes in meeting 38 Result 4: High N results in younger pseudonym distribution because it is easier to find cooperative nodes.  = 1,  =5, c 0 =1, =1

Model Validation 39 Random walk model 10km X 10km Transmission range: 100 meters Run simulation until convergence

Conclusion Developed a framework to measure the distribution of age of pseudonyms Main result: Possible to design system with low distribution of age of pseudonym Obtained a fundamental building block of location-privacy-preserving systems 40 lca.epfl.ch/privacy twitter.com/jfreudiger